100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

ISACA Cybersecurity Exam Questions with Accurate Answers

Puntuación
-
Vendido
-
Páginas
44
Grado
A+
Subido en
24-07-2025
Escrito en
2024/2025

Acceptable Use policy correct answer A policy that establishes an agreement between users and the enterprise and defines for all parties' the ranges of use that are approved before gaining access to a network or the Internet. Access control list (ACL) correct answer An internal computerized table of access rules regarding the levels of computer access permitted to logon IDs and computer terminals. Scope Notes: Also referred to as access control tables. Access rights correct answer The permission or privileges granted to users, programs or workstations to create, change, delete or view data and files within a system, as defined by rules established by data owners and the information security policy. Accountability correct answer The ability to map a given activity or event back to the responsible party. Advanced Encryption Standard (AES) correct answer A public algorithm that supports keys from 128 bits to 256 bits in size Advanced persistent threat (APT) correct answer An adversary that possesses sophisticated levels of expertise and significant resources that allow it to create opportunities to achieve its objectives by using multiple attack vectors, including cyber, physical and deception. Typically, APT objectives include establishing and extending footholds within the IT infrastructure of the targeted organizations for purposes of exfiltrating information, or undermining or impeding critical aspects of a mission, program or organization; or positioning itself to carry out those

Mostrar más Leer menos
Institución
Cybersecurity For Technical Staff
Grado
Cybersecurity for Technical Staff











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Cybersecurity for Technical Staff
Grado
Cybersecurity for Technical Staff

Información del documento

Subido en
24 de julio de 2025
Número de páginas
44
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

ISACA Cybersecurity Exam
Questions with Accurate
Answers
Acceptable Use policy correct answer A policy that establishes an agreement
between users and the enterprise and defines for all parties' the ranges of use
that are approved before gaining access to a network or the Internet.


Access control list (ACL) correct answer An internal computerized table of access
rules regarding the levels of computer access permitted to logon IDs and
computer terminals. Scope Notes: Also referred to as access control tables.


Access rights correct answer The permission or privileges granted to users,
programs or workstations to create, change, delete or view data and files within a
system, as defined by rules established by data owners and the information
security policy.


Accountability correct answer The ability to map a given activity or event back to
the responsible party.


Advanced Encryption Standard (AES) correct answer A public algorithm that
supports keys from 128 bits to 256 bits in size


Advanced persistent threat (APT) correct answer An adversary that possesses
sophisticated levels of expertise and significant resources that allow it to create
opportunities to achieve its objectives by using multiple attack vectors, including
cyber, physical and deception. Typically, APT objectives include establishing and
extending footholds within the IT infrastructure of the targeted organizations for

,purposes of exfiltrating information, or undermining or impeding critical aspects
of a mission, program or organization; or positioning itself to carry out those
objectives in the future. The advanced persistent threat pursues its objectives
repeatedly, over an extended period, adapts to defenders' efforts to resist it and
is determined to maintain the level of interaction that is needed to execute its
objectives. Source: NIST SP 800-39


Adversary correct answer A threat agent


Adware correct answer A software package that automatically plays, displays or
downloads advertising material to a computer after the software is installed on it
or while the application is being used. Scope Notes: In most cases, this is done
without any notification to the user or without the user's consent. The term
adware may also refer to software that displays advertisements, whether or not it
does so with the user's consent; such programs display advertisements as an
alternative to shareware registration fees. These are classified as adware in the
sense of advertising supported software, but not as spyware. Adware in this form
does not operate surreptitiously or mislead the user, and it provides the user with
a specific service.


Analog correct answer A transmission signal that varies continuously in amplitude
and time and is generated in wave formation. Scope Notes: Analog signals are
used in telecommunications


Antimalware correct answer A widely used technology to prevent, detect and
remove many categories of malware, including computer viruses, worms, Trojans,
keyloggers, malicious browser plug-ins, adware and spyware


Antivirus software correct answer An application software deployed at multiple
points in an IT architecture. It is designed to detect and potentially eliminate virus

,code before damage is done and repair or quarantine files that have already been
infected.


Application layer correct answer In the Open Systems Interconnection (OSI)
communications model, the application layer provides services for an application
program to ensure that effective communication with another application
program in a network is possible.


Architecture correct answer Description of the fundamental underlying design of
the components of the business system, or of one element of the business system
(e.g., technology), the relationships among them, and the manner in which they
support enterprise objectives.


Asset correct answer Something of either tangible or intangible value that is
worth protecting, including people, information, infrastructure, finances and
reputation.


Asymmetric key (public key) correct answer A cipher technique in which different
cryptographic keys are used to encrypt and decrypt a message. Scope Notes: See
public key encryption.


Attack correct answer An actual occurrence of an adverse event


Attack mechanism correct answer A method used to deliver the exploit. Unless
the attacker is personally performing the attack, an attack mechanism may
involve a payload, or container, that delivers the exploit to the target.

, Attack vector correct answer A path or route used by the adversary to gain access
to the target (asset). Scope Notes: There are two types of attack vectors: ingress
and egress (also known as data exfiltration)


Audit trail correct answer Data in the form of a logical path linking a sequence of
events, used to trace the transactions that have affected the contents of a record.
Source : ISO


Authentication correct answer 1. The act of verifying identity, i.e., user, system.
Scope Notes: Risk: Can also refer to the verification of the correctness of a piece
of data. 2. The act of verifying the identity of a user, the user's eligibility to access
computerized information. Scope Notes: Assurance: Authentication is designed to
protect against fraudulent logon activity. It can also refer to the verification of the
correctness of a piece of data.


Authenticity correct answer Undisputed authorship


Availability correct answer Ensuring timely and reliable access to and use of
information


Back door correct answer A means of regaining access to a compromised system
by installing software or configuring existing software to enable remote access
under attacker-defined conditions


Bandwidth correct answer The range between the highest and lowest
transmittable frequencies. It equates to the transmission capacity of an electronic
line and is expressed in bytes per second or Hertz (cycles per second).


Bastion correct answer System heavily fortified against attacks
$17.59
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
starwid Yale University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
13
Miembro desde
7 meses
Número de seguidores
1
Documentos
8640
Última venta
1 mes hace

3.3

4 reseñas

5
1
4
0
3
2
2
1
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes